General
-
Target
DEBIT NOTE.exe
-
Size
960KB
-
Sample
221208-csfacsbg5t
-
MD5
0e4b935de0d3a5f7f55dcc7e2895e8fa
-
SHA1
1232483ee0d3d6a4ece0237247d9cd5b9c36dcaa
-
SHA256
31e49f1d5620418ef41da80331c1f3bfb578566ab0fdf53fc9890919a9896af5
-
SHA512
bf6a34a956182b69aeb3b2113d01a250f5b81e7534386cab02fbf49fce8dc99f412883c59f460c1150e8c9f5f793b0277e36418076c5770b48b57efb1ed8da96
-
SSDEEP
24576:1GYAKI2iimCOvCF6oiFKjqcqJDxwg5+Rka:1GYpX9mk6oNjwJ7eB
Static task
static1
Behavioral task
behavioral1
Sample
DEBIT NOTE.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
DEBIT NOTE.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.orogenicgroup-bd.com - Port:
587 - Username:
[email protected] - Password:
Hossain$3400 - Email To:
[email protected]
Targets
-
-
Target
DEBIT NOTE.exe
-
Size
960KB
-
MD5
0e4b935de0d3a5f7f55dcc7e2895e8fa
-
SHA1
1232483ee0d3d6a4ece0237247d9cd5b9c36dcaa
-
SHA256
31e49f1d5620418ef41da80331c1f3bfb578566ab0fdf53fc9890919a9896af5
-
SHA512
bf6a34a956182b69aeb3b2113d01a250f5b81e7534386cab02fbf49fce8dc99f412883c59f460c1150e8c9f5f793b0277e36418076c5770b48b57efb1ed8da96
-
SSDEEP
24576:1GYAKI2iimCOvCF6oiFKjqcqJDxwg5+Rka:1GYpX9mk6oNjwJ7eB
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-